The best way to stop a hacker is to think like one. That’s the idea behind my new course. What’s an “ethical hacker,” you ask? Ethical hackers use the same tools and techniques as malicious hackers, but instead of causing mayhem, they help people improve their security and prevent real attacks. This course is designed to be a starting point for anyone interested in stepping into the security field. It raises awareness about the risks and dangers of the digital realm and how your behavior could make you a target for black hat hackers (the bad guys).
You’d be surprised just how much you can contribute to the overall security of your home and workplace by taking a few basic steps. Let me explain.
Think of your household as a system. You might have a fence, an expensive alarm system, and maybe even a guard dog to keep intruders out. But the safety and security of the system depend on all the different components of the system: you, your partner, your kids, and all of your digital devices (phones, laptops, routers, and anything else with a processor and network card). If you don’t understand digital security, you might not care about receiving an email from an unknown sender. You might not know that simply opening that email reveals identifying information about you and that clicking on the link inside the email reveals even more. Before you know it, you’ve compromised your household and given attackers information they can use to steal from or blackmail you and your family.
The same thing happens to businesses all the time. Black hat hackers find it a lot easier to compromise individual employees than to find a way around a company’s security. Why bother reverse-engineering application source code, the firmware of the super expensive routers corporations use as firewalls, or intrusion detection and prevention systems when you can accomplish the same goal by hacking an employee’s home router and gaining access to every device in their home?
This is what the CEH course is all about. By making you aware of possible attack vectors, I hope to make you less susceptible to exploitation. We’ll talk about why you shouldn’t open every email, why you should check your surroundings before typing in a password, why you should always create strong passwords, and why you should be careful about what you leave on your desk or throw in the trash. Hackers are crafty. This course will help you learn to think like a hacker so you know what attacks to watch out for and how to protect yourself.
For example, you might think that using long passwords is enough to keep you secure. And you’d be partially right. Password cracking techniques require a lot of computer processing power, and the stronger the password, the longer it takes to crack. But these days, hackers can use cloud computing to increase their processing power and run more cracking attempts per second than was previously possible. In one of our hands-on labs, I’ll show you how to do this yourself so you can see just how easy it is.
Whether you’re interested in becoming a Certified Ethical Hacker and conducting penetration tests or just want to learn more about security in general, this course is for you. And with October being Cybersecurity Awareness Month, what better time is there to get started? 🙂 Check it out and let me know what you think. Stay secure!